Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/75772?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "type": "ebuild", "namespace": "dev-db", "name": "mysql", "version": "10.0.28", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "10.0.30-r1", "latest_non_vulnerable_version": "10.2.22", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41737?format=api", "vulnerability_id": "VCID-39rq-1cg5-9ueu", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5633" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386576", "reference_id": "1386576", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386576" }, { "reference_url": "http://www.securityfocus.com/bid/93702", "reference_id": "93702", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/" } ], "url": "http://www.securityfocus.com/bid/93702" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5633" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39rq-1cg5-9ueu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41745?format=api", "vulnerability_id": "VCID-3b6t-dn57-qbhb", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8288", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44537", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.4449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44508", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44446", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44503", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8288" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386590", "reference_id": "1386590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386590" }, { "reference_url": "http://www.securityfocus.com/bid/93740", "reference_id": "93740", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/" } ], "url": "http://www.securityfocus.com/bid/93740" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8288" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3b6t-dn57-qbhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41728?format=api", "vulnerability_id": "VCID-3u5f-yadd-zkf7", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13148", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13038", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13323", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13253", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5625" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386567", "reference_id": "1386567", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386567" }, { "reference_url": "http://www.securityfocus.com/bid/93617", "reference_id": "93617", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/" } ], "url": "http://www.securityfocus.com/bid/93617" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5625" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3u5f-yadd-zkf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41724?format=api", "vulnerability_id": "VCID-4maq-x6xs-x7gm", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71462", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71447", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71429", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71428", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7144", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5507" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386556", "reference_id": "1386556", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386556" }, { "reference_url": "http://www.securityfocus.com/bid/93678", "reference_id": "93678", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/" } ], "url": "http://www.securityfocus.com/bid/93678" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5507" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4maq-x6xs-x7gm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41730?format=api", "vulnerability_id": "VCID-8bs6-r11g-c3dx", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80157", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80134", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80163", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80139", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5627" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386570", "reference_id": "1386570", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386570" }, { "reference_url": "http://www.securityfocus.com/bid/93642", "reference_id": "93642", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/" } ], "url": "http://www.securityfocus.com/bid/93642" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5627" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bs6-r11g-c3dx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41725?format=api", "vulnerability_id": "VCID-8kvb-5u8c-zbc4", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63345", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63337", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63338", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386557", "reference_id": "1386557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386557" }, { "reference_url": "http://www.securityfocus.com/bid/93735", "reference_id": "93735", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/" } ], "url": "http://www.securityfocus.com/bid/93735" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3706", "reference_id": "dsa-3706", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3706" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://usn.ubuntu.com/3109-1/", "reference_id": "USN-3109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5584" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41726?format=api", "vulnerability_id": "VCID-b2aa-32zq-aqd5", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80157", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80134", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80163", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01357", "scoring_system": "epss", "scoring_elements": "0.80139", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5609" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386559", "reference_id": "1386559", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386559" }, { "reference_url": "http://www.securityfocus.com/bid/93622", "reference_id": "93622", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/" } ], "url": "http://www.securityfocus.com/bid/93622" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5609" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2aa-32zq-aqd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41734?format=api", "vulnerability_id": "VCID-c66q-ap9s-57e1", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5631" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386574", "reference_id": "1386574", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386574" }, { "reference_url": "http://www.securityfocus.com/bid/93684", "reference_id": "93684", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "http://www.securityfocus.com/bid/93684" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5631" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c66q-ap9s-57e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41735?format=api", "vulnerability_id": "VCID-c9c7-nkt8-4baa", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5632" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386575", "reference_id": "1386575", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386575" }, { "reference_url": "http://www.securityfocus.com/bid/93693", "reference_id": "93693", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/" } ], "url": "http://www.securityfocus.com/bid/93693" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5632" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9c7-nkt8-4baa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41746?format=api", "vulnerability_id": "VCID-dn63-evjx-5khp", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22534", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22645", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22537", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22668", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8289" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386591", "reference_id": "1386591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386591" }, { "reference_url": "http://www.securityfocus.com/bid/93720", "reference_id": "93720", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/" } ], "url": "http://www.securityfocus.com/bid/93720" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8289" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn63-evjx-5khp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=api", "vulnerability_id": "VCID-gp4w-bdxg-6kab", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66038", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572", "reference_id": "1386572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572" }, { "reference_url": "http://www.securityfocus.com/bid/93668", "reference_id": "93668", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securityfocus.com/bid/93668" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5629" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41727?format=api", "vulnerability_id": "VCID-gyjy-c8wc-qubd", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72311", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72217", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.7226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72302", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72267", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561", "reference_id": "1386561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561" }, { "reference_url": "http://www.securityfocus.com/bid/93630", "reference_id": "93630", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://www.securityfocus.com/bid/93630" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5612" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41733?format=api", "vulnerability_id": "VCID-jj46-73tp-nub5", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73249", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73199", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.7322", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.7323", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5630" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386573", "reference_id": "1386573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386573" }, { "reference_url": "http://www.securityfocus.com/bid/93674", "reference_id": "93674", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "http://www.securityfocus.com/bid/93674" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5630" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj46-73tp-nub5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41723?format=api", "vulnerability_id": "VCID-jnue-w479-eqdw", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72837", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72891", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72932", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00739", "scoring_system": "epss", "scoring_elements": "0.72877", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3495" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386555", "reference_id": "1386555", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386555" }, { "reference_url": "http://www.securityfocus.com/bid/93670", "reference_id": "93670", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/" } ], "url": "http://www.securityfocus.com/bid/93670" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-3495" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnue-w479-eqdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41739?format=api", "vulnerability_id": "VCID-k7av-yra2-ckap", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5635" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386580", "reference_id": "1386580", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386580" }, { "reference_url": "http://www.securityfocus.com/bid/93715", "reference_id": "93715", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/" } ], "url": "http://www.securityfocus.com/bid/93715" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5635" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k7av-yra2-ckap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41743?format=api", "vulnerability_id": "VCID-kg6w-jbac-5yf8", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8286", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25804", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25873", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25916", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25756", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8286" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386588", "reference_id": "1386588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386588" }, { "reference_url": "http://www.securityfocus.com/bid/93745", "reference_id": "93745", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/" } ], "url": "http://www.securityfocus.com/bid/93745" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8286" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg6w-jbac-5yf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41744?format=api", "vulnerability_id": "VCID-kvz9-pnmc-jfbp", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50886", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50839", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50801", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50784", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50841", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8287" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386589", "reference_id": "1386589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386589" }, { "reference_url": "http://www.securityfocus.com/bid/93727", "reference_id": "93727", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/" } ], "url": "http://www.securityfocus.com/bid/93727" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8287" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvz9-pnmc-jfbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41747?format=api", "vulnerability_id": "VCID-pchw-5h2a-27fk", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8290", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.6761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67647", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67713", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8290" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386592", "reference_id": "1386592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386592" }, { "reference_url": "http://www.securityfocus.com/bid/93733", "reference_id": "93733", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/" } ], "url": "http://www.securityfocus.com/bid/93733" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8290" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pchw-5h2a-27fk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=api", "vulnerability_id": "VCID-rted-6vzz-mbcv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68526", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.6852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68412", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68431", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554", "reference_id": "1386554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554" }, { "reference_url": "http://www.securityfocus.com/bid/93650", "reference_id": "93650", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securityfocus.com/bid/93650" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-3492" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41740?format=api", "vulnerability_id": "VCID-skzt-r7sx-1ucv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99556", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99557", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.9956", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198", "reference_id": "1375198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198" }, { "reference_url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2058", "reference_id": "RHSA-2016:2058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2059", "reference_id": "RHSA-2016:2059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2060", "reference_id": "RHSA-2016:2060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2061", "reference_id": "RHSA-2016:2061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2062", "reference_id": "RHSA-2016:2062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2077", "reference_id": "RHSA-2016:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" }, { "reference_url": "https://usn.ubuntu.com/3078-1/", "reference_id": "USN-3078-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3078-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-6662" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4730?format=api", "vulnerability_id": "VCID-tdbv-p3up-vfgv", "summary": "SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54779", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54665", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54787", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6652" }, { "reference_url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe" }, { "reference_url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f" }, { "reference_url": "https://jira.spring.io/browse/DATAJPA-965", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://jira.spring.io/browse/DATAJPA-965" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6652", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6652" }, { "reference_url": "https://pivotal.io/security/cve-2016-6652", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pivotal.io/security/cve-2016-6652" }, { "reference_url": "http://www.securityfocus.com/bid/93276", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/93276" }, { "reference_url": "https://github.com/advisories/GHSA-xr4v-28rm-pvgw", "reference_id": "GHSA-xr4v-28rm-pvgw", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-xr4v-28rm-pvgw" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-6652", "GHSA-xr4v-28rm-pvgw" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdbv-p3up-vfgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41738?format=api", "vulnerability_id": "VCID-teh5-9459-p7a8", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5634" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386579", "reference_id": "1386579", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386579" }, { "reference_url": "http://www.securityfocus.com/bid/93709", "reference_id": "93709", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/" } ], "url": "http://www.securityfocus.com/bid/93709" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5634" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teh5-9459-p7a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=api", "vulnerability_id": "VCID-tvdv-3ed5-h3dt", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58818", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58805", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568", "reference_id": "1386568", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568" }, { "reference_url": "http://www.securityfocus.com/bid/93638", "reference_id": "93638", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securityfocus.com/bid/93638" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5626" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=api", "vulnerability_id": "VCID-vh5y-15tw-d7fd", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5829", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58144", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585", "reference_id": "1386585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585" }, { "reference_url": "http://www.securityfocus.com/bid/93737", "reference_id": "93737", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securityfocus.com/bid/93737" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8283" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41742?format=api", "vulnerability_id": "VCID-wnpa-9f9q-dfbs", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8284", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20822", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20823", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20884", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8284" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386587", "reference_id": "1386587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386587" }, { "reference_url": "http://www.securityfocus.com/bid/93755", "reference_id": "93755", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/" } ], "url": "http://www.securityfocus.com/bid/93755" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-8284" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnpa-9f9q-dfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41731?format=api", "vulnerability_id": "VCID-zyjr-6hy7-k7ax", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86329", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86415", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86394", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.8641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86357", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86359", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02921", "scoring_system": "epss", "scoring_elements": "0.86387", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5628" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386571", "reference_id": "1386571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386571" }, { "reference_url": "http://www.securityfocus.com/bid/93662", "reference_id": "93662", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/" } ], "url": "http://www.securityfocus.com/bid/93662" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.34", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.0.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" } ], "aliases": [ "CVE-2016-5628" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyjr-6hy7-k7ax" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28" }